A Graph-Based Approach to Alert Contextualisation in Security Operations Centres Authors: Magnus Wiik Eckhoff, Peter Marius Flydal, Siem Peters, Martin Eian, Jonas Halvorsen, Vasileios Mavroeidis, Gudmund Grov | Published: 2025-09-16 Security AnalysisAttack Scenario AnalysisMachine Learning Method 2025.09.16 2025.09.18 Literature Database
EByFTVeS: Efficient Byzantine Fault Tolerant-based Verifiable Secret-sharing in Distributed Privacy-preserving Machine Learning Authors: Zhen Li, Zijian Zhang, Wenjin Yang, Pengbo Wang, Zhaoqi Wang, Meng Li, Yan Wu, Xuyang Liu, Jing Sun, Liehuang Zhu | Published: 2025-09-16 Secure AggregationDifferential PrivacyAdversarial Learning 2025.09.16 2025.09.18 Literature Database
A Scalable Architecture for Efficient Multi-bit Fully Homomorphic Encryption Authors: Jiaao Ma, Ceyu Xu, Lisa Wu Wills | Published: 2025-09-16 Algorithm安全性メカニズムの分析Watermark 2025.09.16 2025.09.18 Literature Database
A Systematic Evaluation of Parameter-Efficient Fine-Tuning Methods for the Security of Code LLMs Authors: Kiho Lee, Jungkon Kim, Doowon Kim, Hyoungshick Kim | Published: 2025-09-16 コード生成手法Backdoor Detection脆弱性検出手法 2025.09.16 2025.09.18 Literature Database
Yet Another Watermark for Large Language Models Authors: Siyuan Bao, Ying Shi, Zhiguang Yang, Hanzhou Wu, Xinpeng Zhang | Published: 2025-09-16 Prompt leakingLarge Language ModelWatermarking Technology 2025.09.16 2025.09.18 Literature Database
Time-Constrained Intelligent Adversaries for Automation Vulnerability Testing: A Multi-Robot Patrol Case Study Authors: James C. Ward, Alex Bott, Connor York, Edmund R. Hunt | Published: 2025-09-15 Model Extraction AttackTaxonomy of Attacks脆弱性検出手法 2025.09.15 2025.09.17 Literature Database
NeuroStrike: Neuron-Level Attacks on Aligned LLMs Authors: Lichao Wu, Sasha Behrouzi, Mohamadreza Rostami, Maximilian Thang, Stjepan Picek, Ahmad-Reza Sadeghi | Published: 2025-09-15 Prompt InjectionLarge Language Model安全性メカニズムの分析 2025.09.15 2025.09.17 Literature Database
An Unsupervised Learning Approach For A Reliable Profiling Of Cyber Threat Actors Reported Globally Based On Complete Contextual Information Of Cyber Attacks Authors: Sawera Shahid, Umara Noor, Zahid Rashid | Published: 2025-09-15 AlgorithmMalware Classification攻撃戦略分析 2025.09.15 2025.09.17 Literature Database
Inducing Uncertainty for Test-Time Privacy Authors: Muhammad H. Ashiq, Peter Triantafillou, Hung Yun Tseng, Grigoris G. Chrysos | Published: 2025-09-15 AlgorithmData CurationModel evaluation methods 2025.09.15 2025.09.17 Literature Database
Cyber Threat Hunting: Non-Parametric Mining of Attack Patterns from Cyber Threat Intelligence for Precise Threats Attribution Authors: Rimsha Kanwal, Umara Noor, Zafar Iqbal, Zahid Rashid | Published: 2025-09-15 Algorithm脅威モデリング自動化Federated Learning 2025.09.15 2025.09.17 Literature Database